Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)
ISBN:
9780791859841
No. of Pages:
698
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
53 Pseudo-Random Pattern Based Cryptography with Using Cellular Learning Automata
By
Atefeh Ghalambor Dezfuly
,
Atefeh Ghalambor Dezfuly
Computer Engineering Dep., Dezful Branch,
Islamic Azad University
, Dezful
, Iran
; at_ghalambor@yahoo.com
Search for other works by this author on:
Saeid Setayeshi
,
Saeid Setayeshi
Nuclear Engineering and Physics Dep.,
Amirkabir University of Technology
, Tehran
, Iran
; setayesh@aut.ac.ir
Search for other works by this author on:
Mohammad Mosleh
Mohammad Mosleh
Search for other works by this author on:
Page Count:
7
-
Published:2011
Citation
Dezfuly, AG, Setayeshi, S, & Mosleh, M. "Pseudo-Random Pattern Based Cryptography with Using Cellular Learning Automata." International Conference on Computer and Electrical Engineering 4th (ICCEE 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
The encryption is one of most essential ways for protecting information against threats. As a sample of swift ways for this purpose, stream ciphering can be indicated. In this type of cryptography, a generator is charged to produce a sequence of bits as the key stream. This sequence is seem to has no specific period pattern and to be a random stream. Linear Feedback Shift Registers and cellular automata have been used as pseudo-random number generator. The most important issue in using cellular automata includes determining an optimal set of rules for cells. This paper focuses on selecting optimal rules set for such this generator based on cellular learning automata.
Abstract
Keywords
1 Introduction
2. Preliminaries
3. CA as a Key Generator
4. Proposed Model
5. Experiments Results
6. Summeries
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
An Improvement of Diamond Encoding for Protecting Steganalysis of Spam Data Mining
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
Multi-Level Video Protection Scheme with Format Compliance for H.264/SVC
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
A New Parallel Encryption Scheme for Massive Data
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
Compression of Bursty Signals Using Time Encoding Modulator
International Conference on Software Technology and Engineering, 3rd (ICSTE 2011)
Related Articles
A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing
J. Comput. Inf. Sci. Eng (August,2021)
Nonlinearity and Feedback Compensation Method in a Pneumatic Vibration Generator
J. Dyn. Sys., Meas., Control (March,2000)
A Model of Neuro–Musculo–Skeletal System for Human Locomotion Under Position Constraint Condition
J Biomech Eng (August,2003)